{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:52:45Z","timestamp":1743043965082,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031502033"},{"type":"electronic","value":"9783031502040"}],"license":[{"start":{"date-parts":[[2023,12,13]],"date-time":"2023-12-13T00:00:00Z","timestamp":1702425600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,13]],"date-time":"2023-12-13T00:00:00Z","timestamp":1702425600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-50204-0_31","type":"book-chapter","created":{"date-parts":[[2023,12,12]],"date-time":"2023-12-12T06:03:09Z","timestamp":1702360989000},"page":"365-378","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Embracing Change from Shadow IT to Collaborative IT Models"],"prefix":"10.1007","author":[{"given":"Sumant","family":"Devasthali","sequence":"first","affiliation":[]},{"given":"Gaurav","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,13]]},"reference":[{"key":"31_CR1","unstructured":"Kent, S., Hougston, L., Kerr, D.: Affective events theory, institutional theory and feral systems: how do they all fit? Presented at the 27th Australian and New Zealand Academy of Management Conference, Hobart, Australia, Hobart, Australia (2013)"},{"key":"31_CR2","unstructured":"Ortbach, K., Bode, M., Niehaves, B.: What influences technological individualization? - An analysis of antecedents to IT consumerization behavior. Presented at the Proceedings of the 19th Americas Conference on Information Systems, Chicago, USA, Chicago, USA, pp. 1\u20139 (2013)"},{"key":"31_CR3","unstructured":"Haag, A.: Appearance of dark clouds? An empirical analysis of users\u2019 shadow sourcing of cloud services. Presented at the Proceedings of the 12. Internationale Tagung Wirtschaftsinformatik, Osnabr\u00fcck, Germany, Osnabr\u00fcck, Germany, pp. 1438\u20131452 (2015)"},{"key":"31_CR4","unstructured":"Kretzer, M., Maedche, A.: Generativity of business intelligence platforms: a research agenda guided by lessons from shadow IT. Presented at the Proceedings of the Multikonferenz Wirtschaftsinformatik, Paderborn, Germany, Paderborn, Germany, pp. 208\u2013220 (2014)"},{"key":"31_CR5","doi-asserted-by":"publisher","unstructured":"Behrens, S.: Shadow systems: the good, the bad and the ugly (2009). https:\/\/doi.org\/10.1145\/1461928.1461960","DOI":"10.1145\/1461928.1461960"},{"key":"31_CR6","unstructured":"Singh, H.: Emergence and consequences of drift in organizational information systems (2010)"},{"key":"31_CR7","unstructured":"Chua, C.E.H., Storey, V.C., Chen, L.: Central IT or Shadow IT? Factors shaping users\u2019 decision to go rogue with IT. Presented at the ICIS 2014 Proceedings (2014)"},{"key":"31_CR8","unstructured":"Kopper, A., Klotz, S., Westner, M., Strahringer, S.: Shadow IT and Business-managed IT: practitioner perceptions and their comparison to literature, vol. XXX, pp. 1\u201325, December 2019"},{"key":"31_CR9","doi-asserted-by":"publisher","unstructured":"Kopper, A., Fuerstenau, D., Rentrop, C.: Business-managed IT: a conceptual framework and empirical illustration. Presented at the Twenty-Sixth European Conference on Information Systems (ECIS2018) (2018). https:\/\/doi.org\/10.4018\/IJITBAG.2018070104","DOI":"10.4018\/IJITBAG.2018070104"},{"key":"31_CR10","unstructured":"Kure, J., Ito, K., Tateiwa, M., Suzuki, S.: Integrating multi-cloud environment with FUJITSU cloud services management. FUJITSU Sci. Tech. J. 53(1), Article no. 1 (2017)"},{"key":"31_CR11","unstructured":"Alexander, N.S., Swatman, P.A.: Informal eCollaboration Channels: Shedding Light on \u2018Shadow CIT,\u2019 June 2008. https:\/\/www.alexandria.unisg.ch\/handle\/20.500.14171\/78203. Accessed 9 Aug 2023"},{"key":"31_CR12","unstructured":"Zimmermann, S., Rentrop, C., Felden, C.: Governing identified shadow IT by allocating IT task responsibilities. Presented at the Americas Conference on Information Systems at San Diego, August 2016. https:\/\/opus.htwg-konstanz.de\/frontdoor\/index\/index\/docId\/978. Accessed 9 Aug 2023"},{"key":"31_CR13","doi-asserted-by":"publisher","unstructured":"Hollweck, T., Yin, R.K.: Case study research design and methods (5th ed.). Can. J. Program Eval. 30(1), 108\u2013110 (2015). https:\/\/doi.org\/10.3138\/cjpe.30.1.108","DOI":"10.3138\/cjpe.30.1.108"},{"issue":"1","key":"31_CR14","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.infoandorg.2006.11.001","volume":"17","author":"MD Myers","year":"2007","unstructured":"Myers, M.D., Newman, M.: The qualitative interview in IS research: examining the craft. Inf. Organ. 17(1), 2\u201326 (2007). https:\/\/doi.org\/10.1016\/j.infoandorg.2006.11.001","journal-title":"Inf. Organ."},{"issue":"3","key":"31_CR15","doi-asserted-by":"publisher","first-page":"369","DOI":"10.2307\/248684","volume":"11","author":"I Benbasat","year":"1987","unstructured":"Benbasat, I., Goldstein, D.K., Mead, M.: The case research strategy in studies of information systems. MIS Q. 11(3), 369 (1987). https:\/\/doi.org\/10.2307\/248684","journal-title":"MIS Q."},{"key":"31_CR16","doi-asserted-by":"publisher","first-page":"120635","DOI":"10.1016\/j.techfore.2021.120635","volume":"166","author":"A Annarelli","year":"2021","unstructured":"Annarelli, A., Battistella, C., Nonino, F., Parida, V., Pessot, E.: Literature review on digitalization capabilities: co-citation analysis of antecedents, conceptualization and consequences. Technol. Forecast. Soc. Change 166, 120635 (2021). https:\/\/doi.org\/10.1016\/j.techfore.2021.120635","journal-title":"Technol. Forecast. Soc. Change"},{"key":"31_CR17","doi-asserted-by":"publisher","unstructured":"G\u00f6kalp, E., Martinez, V.: Digital transformation maturity assessment: development of the digital transformation capability maturity model. Int. J. Prod. Res. 60(20), Article no. 20 (2022). https:\/\/doi.org\/10.1080\/00207543.2021.1991020","DOI":"10.1080\/00207543.2021.1991020"},{"key":"31_CR18","doi-asserted-by":"publisher","unstructured":"\u00c7ali\u015f, B.: Capability model and competence measuring for smart hospital system: an analysis for Turkey. Int. J. Health Serv. Res. Policy 5(1), Article no. 1 (2020). https:\/\/doi.org\/10.33457\/ijhsrp.670597","DOI":"10.33457\/ijhsrp.670597"},{"key":"31_CR19","doi-asserted-by":"publisher","unstructured":"Mart\u00edn-Pe\u00f1a, M.L., D\u00edaz-Garrido, E., S\u00e1nchez-L\u00f3pez, J.M.: The digitalization and servitization of manufacturing: a review on digital business models. Strateg. Change 27(2), Article no. 2 (2018). https:\/\/doi.org\/10.1002\/jsc.2184","DOI":"10.1002\/jsc.2184"},{"issue":"1","key":"31_CR20","doi-asserted-by":"publisher","first-page":"1119","DOI":"10.3233\/JIFS-179473","volume":"38","author":"G B\u00fcy\u00fck\u00f6zkan","year":"2020","unstructured":"B\u00fcy\u00fck\u00f6zkan, G., G\u00fcler, M.: Analysis of companies\u2019 digital maturity by hesitant fuzzy linguistic MCDM methods. J. Intell. Fuzzy Syst. 38(1), 1119\u20131132 (2020). https:\/\/doi.org\/10.3233\/JIFS-179473","journal-title":"J. Intell. Fuzzy Syst."},{"key":"31_CR21","doi-asserted-by":"publisher","unstructured":"Garmaki, M., Gharib, R.K., Boughzala, I.: Big data analytics capability and\u00a0contribution to firm performance: the mediating effect of\u00a0organizational learning on\u00a0firm performance. J. Enterp. Inf. Manag. 36, 1161\u20131184 (2023). https:\/\/doi.org\/10.1108\/JEIM-06-2021-0247","DOI":"10.1108\/JEIM-06-2021-0247"},{"key":"31_CR22","unstructured":"An, J.: 77 Building Blocks of Digital Transformation. eBook Partnership (2018). https:\/\/books.google.co.in\/books?id=2FN1zQEACAAJ"},{"key":"31_CR23","unstructured":"Charmaz, K.: Constructing Grounded Theory, Second. SAGE (2014). https:\/\/uk.sagepub.com\/en-gb\/eur\/constructing-grounded-theory\/book235960"}],"container-title":["IFIP Advances in Information and Communication Technology","Transfer, Diffusion and Adoption of Next-Generation Digital Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-50204-0_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,12]],"date-time":"2023-12-12T06:24:46Z","timestamp":1702362286000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-50204-0_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,13]]},"ISBN":["9783031502033","9783031502040"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-50204-0_31","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2023,12,13]]},"assertion":[{"value":"13 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"TDIT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Working Conference on Transfer and Diffusion of IT","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nagpur","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"tdit2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iimnagpur.ac.in\/IFIP2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easy Chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"209","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"87","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}